Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Android malware potentially stole up to 450,000 pieces of personal data: Symantec

More than 3000 visits were made to fake app store, Android Express Play

A fake app store that steals personal information on Android devices may have potentially stolen between 75,000 and 450,000 pieces of personal data such as contact details, according to security firm Symantec.

Not long after Symantec discovered Android.Exprespam, the security firm acquired data that indicated more than 3000 visits were made to the fake app store called Android Express’s Play from 13-20 January.

“The scam has only been around for about two weeks so I am sure that this is just the beginning for the scammers and the amount of personal data collected will increase exponentially,” Joji Hamada, a Symantec employee, wrote in a blog post.

Symantec has found another version of the fake app store, with the domain registed by the Exprespam scammers. The store has not been given a name and appears to still be under construction. However, the security firm warns that a new malware variant is being hosted in the site.

“The scammers are constantly modifying their tactics so that the scam provides a good ‘return’ for them. These updates will not end until the scammers either are caught by the authorities and punished or cease scamming people, which is unlikely to happen anytime soon,” Hamada wrote.

For all smartphone users, the research firm suggests to only download apps from well-known app vendors, avoid clicking on links in emails from unknown sources and install a security app.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Symantec
References show all
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: Android.Exprespam, security, Android Express’s Play, Android, malware
Latest Blog Posts
Whitepapers
  • IBM X-Force Threat Intelligence
    In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
    Learn more »
  • Information Management
    Valuable data can be a needle in a haystack, but by leveraging the value in existing information assets, organisations can generate real and achievable gains in revenue generation, IT investments and productivity gains. This whitepaper discusses how Information Management (IM) is a multi-faceted discipline that can be employed to meet or exceed your business objectives.
    Learn more »
  • The F5 DDoS Protection Reference Architecture part 3 of 3
    This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments

Computerworld
ARN
Techworld
CMO